TapeTrack uses a compressed and encrypted binary protocol to communicate between clients and servers.
When a TapeTrack Server is exposed to the internet, it is common for unauthorized connection attempts to occur. These are typically automated scans from hackers who are unaware they’re targeting a TapeTrack service. For example, a server running on port 5000 may be mistaken for:
Although unauthorized access is extremely difficult due to TapeTrack’s protocol and encryption, repeated connection attempts can consume server resources.
TapeTrack implements a lightweight defense mechanism to reduce impact from non-compliant clients:
Once an IP address (or gateway) sends a non-TapeTrack packet, all future connections from that IP during the time-out period will be accepted but terminated immediately.
On Linux systems, TapeTrack can integrate with eBPF for kernel-level IP blocking.
To enable this:
For setup instructions and eBPF integration steps, refer to the eBPF Configuration Technote.